Data, web, and application security has evolved dramatically over the past few years. Just as new threats abound, the architecture of…
Read MoreResearch
GigaOm Radar for Phishing Prevention and Detection
In 2020, global email usage will top 300 billion messages sent, according to technology market research firm The Radicati Group. And…
Read MoreHYCU
HYCU provides an innovative approach to data protection, combining efficiency and ease of use thanks to a set of purpose-built, specifically…
Read MoreArea 1
We covered Area1 Security in our 2018 Phishing Landscape. The company has continued its upward trajectory and holds a strong position…
Read MoreKey Criteria for Evaluating Phishing Protection Platforms
Phishing is the primary method for breaching businesses. According to a 2018 Verizon Data Breach report, 96% of all attacks begin…
Read MoreZimperium
We covered Zimperium in our December 2018 Landscape Report, and they continue to stand out in their approach and philosophy. Zimperium…
Read MoreSelecting and Adopting a Security-Standards Framework
Many organizations find themselves having to address the information security demands of their clients in addition to government regulators. Losing bids…
Read MoreZero Trust Cloud Security Provider Aporeto: Product Profile and Evaluation
Microservices approaches such as Kubernetes are changing the way people think about applications, bringing the dual benefits of massive scalability and…
Read MoreAporeto Product Evaluation Test Lab Setup and Instructions
This report documents the GigaOm Field Test Lab Setup instructions to evaluate Aporeto’s zero trust cloud security solution. This report corresponds…
Read MorePublic Key Infrastructure
The role of the CIO has evolved and encompasses more than managing servers, data centers, and the applications that run on…
Read MoreFinancial Services: Document Productivity and the Digital Experience
Documents have always been part of the financial services industry. The ability to represent agreements or processes with documents is key…
Read MoreDevSecOps
To ensure data and services are protected against attack, DevOps is evolving to incorporate cybersecurity practices across the lifecycle. Organizations need…
Read MoreDeception Technology
Deception technology is designed to detect the presence of adversaries on an enterprise network by using decoy systems as bait and…
Read MoreBug Bounty and Penetration Testing
Bug bounties and penetration testing (pen-testing) are powerful techniques that uncover flaws in controls, applications, and hardware. They enable enterprises to…
Read MoreKey Criteria for Evaluating Enterprise HCI
IT organizations of all sizes are facing several infrastructure challenges. On one hand, they repeatedly receive pressing requirements coming from the…
Read MoreLeveling Up DevOps Security
Cybersecurity and innovation are not the most comfortable of bedfellows. While every CIO will say security is a top priority, innovation…
Read MoreAdvanced Behavioral Analytics and Threat Detection: Next-Gen Info Security and Network Defense
The ability to detect events and determine their intent — good versus bad — is crucial to information security and network…
Read MoreData Protection and Data Management Vendor Review of Veeam: Customer-Focused, Future Forward, Feet on the Ground
Last week I attended VeeamON 2019, in Miami, and I had the chance to get a better idea about the status…
Read MoreEnterprise-Level Mobile and IoT Security
Mobile devices have become ubiquitous within the enterprise over the last decade moving from shadow implementations to mainstream for extended communications,…
Read MoreHow IBM is Rethinking its Data Protection Line-Up
Following up on my take on the evolution of product and strategy of companies like Cohesity and NetApp, today I’d like…
Read MoreThe New Ecosystem of Identity Access Management
The saying goes, “Identity is the new security perimeter.” This changes the traditional way we think about granting users access to…
Read MoreFrom Data Protection to Data Management and Beyond
Just three weeks into 2019, Veeam announced a $500M funding round. The company is privately held, profitable and with a pretty…
Read MorePhishing Prevention and Detection
Information security touches every aspect of our digital lives in unpredictable and often unintuitive ways. We are all expert in understanding…
Read MoreCIO Report: Enterprise Data Protection
The enterprise data protection market still leverages a traditional approach to solving the increasingly complicated enterprise requirements. Solutions range from on-premises…
Read More